Skip to main content

No project description provided

Project description

reait

RevEng.AI Toolkit

Analyse compiled executable binaries using the RevEng.AI API. This tool allows you to search for similar components across different compiled executable programs. More details about the API can be found at docs.reveng.ai.

NB: We are in Alpha. We support GNU/Linux ELF and Windows PE executables for x86_64, and focus our support for x86_64 Linux ELF executables.

Installation

Install the latest stable version using pip.

pip install reait

Latest development version

pip install -e .

Using reait

Analysing binaries

To submit a binary for analysis, run reait with the -a flag:

reait -b /usr/bin/true -a

This uploads the binary specified by -b to RevEng.AI servers for analysis. Depending on the size of the binary, it may take several hours. You may check an analysis jobs progress with the -l flag e.g. reait -b /usr/bin/true -l.

Extract symbol embeddings

Symbol embeddings are numerical vector representations of each component that capture their semantic understanding. Similar functions should be similar to each other in our embedded vector space. They can be thought of as advanced AI-based IDA FLIRT signatures or Radare2 Zignatures. Once an analysis is complete, you may access RevEng.AI's BinNet embeddings for all symbols extracted with the -x flag.

reait -b /usr/bin/true -x > embeddings.json

Extract embedding for symbol at vaddr 0x19f0

reait -b /usr/bin/true -x | jq ".[] | select(.vaddr==$((0x19f0))).embedding" > embedding.json

Search for similar symbols based on JSON embedding file

To query our database of similar symbols based on an embedding, use -n to search using Approximate Nearest Neighbours. The --nns allows you to specify the number of results returned. A list of symbol names and the distance between each vector is returned.

reait -e embedding.json -n

NB: A smaller distance indicates a higher degree of similarity.

Limited Search

To search for the most similar symbols found in a binary to a specific embedding, use the --found-in option with a path to the executable.

reait -n --embedding /tmp/sha256_init.json --found-in ~/malware.exe --nns 5

This downloads embeddings from malware.exe and computes the cosine similarity between all symbols and sha256_init.json. The returned results lists the most similar symbol locations by cosine similarity score (1.0 most similar, -1.0 dissimilar).

Configuration

reait reads the config file stored at ~/.reait.toml. An example config file looks like:

apikey = "l1br3"
host = "https://api.reveng.ai"

Contact

Connect with us by filling out the contact form at RevEng.AI.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

reait-0.0.10.tar.gz (17.4 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

reait-0.0.10-py3-none-any.whl (17.5 kB view details)

Uploaded Python 3

File details

Details for the file reait-0.0.10.tar.gz.

File metadata

  • Download URL: reait-0.0.10.tar.gz
  • Upload date:
  • Size: 17.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.9.13

File hashes

Hashes for reait-0.0.10.tar.gz
Algorithm Hash digest
SHA256 857e49dccc64f51b4ed62449c7dc1d8f85eec05d8382ee88863d49faa9f661cd
MD5 daea1c13fa7ffa8cfb3b4a3cc8bf566a
BLAKE2b-256 613cd47233101132de6c4f17d7795d711ffb80b616d6505617d433415b851fb7

See more details on using hashes here.

File details

Details for the file reait-0.0.10-py3-none-any.whl.

File metadata

  • Download URL: reait-0.0.10-py3-none-any.whl
  • Upload date:
  • Size: 17.5 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.1 CPython/3.9.13

File hashes

Hashes for reait-0.0.10-py3-none-any.whl
Algorithm Hash digest
SHA256 f604d7a516064a7c8820d7ac73be819ca7898da56042acdeb9ca35e8f9116f56
MD5 560c5280de386764149709b132c3b84a
BLAKE2b-256 3c0a907442d75461377605333e4882fee7c4bfba797af394967b5b7de6e2f5e9

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page